Return to Article Details Identification and Avoidance of Malicious Nodes by using Certificate Revocation Method Download Download PDF